Cybersecurity Practices for Health Care Organizations~ RJ BLANCHARD BENEFIT SERVICES

Page 4

Cybersecurity Practices at MediumSized Health Care Organizations Medium-sized health care organizations perform critical functions for the health care and public health (HPH) sector. These organizations include critical access hospitals in rural areas, practice management organizations that support physician practices, revenue cycle or billing organizations, mid-sized device manufacturers, and group practices. Medium-sized health care organizations generally employ hundreds of personnel, maintain between hundreds and a few thousand information technology (IT) assets, and may be primary partners with and liaisons between small and large health care organizations. It is typical for a medium-sized organization to have several critical systems that are interconnected to enable work activities in support of the organization’s mission/ These organizations tend to have a diverse inventory of assets that support multiple revenue streams. They also tend to have narrow profit margins, limited resources, and limited flexibility to implement robust cybersecurity practices. For example, it is rare for a medium-sized organization to have its own dedicated 24x7x365 security operations center (SOC) Medium-sized organizations tend to focus on preventing cybersecurity events, implementing rigid security policies, with few exceptions permitted. This rigidity is often due to insufficient resources to support more open and flexible cybersecurity models, such as those larger organizations can often afford. Medium-sized organizations usually struggle to obtain cybersecurity funding that is distinct from their standard IT budgets. The top security professional in an organization of this size might often feel overwhelmed by compliance and cybersecurity duties, wear multiple hats, and experience constraints around execution plans. Medium-sized organizations operate in complex legal and regulatory environments that include but are not limited to the following: 

The Office of the National Coordinator for Health Information Technology (ONC) regulations for interoperability of Certified Electronic Health Information Technology

The Medicare Access and hildren’s Health Insurance Program Reauthorization Act of 2015 (MACRA)/Meaningful Use

Multiple enforcement obligations under the Food and Drug Administration (FDA)

The Joint Commission accreditation processes

The Health Insurance Portability and Accountability Act (HIPAA)/Health Information Technology Economic and Clinical Health Act (HITECH) requirements

The Payment Card Industry Data Security Standard (PCI-DSS)

Substance Abuse and Mental Health Services Administration (SAMHSA) requirements

The Gramm-Leach-Bliley Act for financial processing

The Stark Law as it relates to providing services to affiliated organizations

The Family Educational Rights and Privacy Act (FERPA) for those institutions participating within Higher Education 4


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Appendix B: References

3min
pages 105-108

Table 13. Incident Response Plays for Attacks Against Medical Devices

8min
pages 93-96

Table 15. Acronyms and Abbreviations

0
page 100

Table 14. Example Cybersecurity Policies for Consideration

0
page 97

Cybersecurity Practice #9: Medical Device Security

10min
pages 87-91

Table 12. Timeframes for Resolving Medical Device Vulnerabilities

1min
page 92

Table 11. Roles and Responsibilities for an Organizational CIRT

17min
pages 79-86

Table 9. Factors for Consideration in Penetration Test Planning

6min
pages 69-72

Cybersecurity Practice #6: Network Management

15min
pages 57-64

Cybersecurity Practice #8: Security Operations Center and Incident Response

4min
pages 73-74

Table 10. Example Incident Response Plays for IR Playbooks

5min
pages 75-78

Cybersecurity Practice #7: Vulnerability Management

5min
pages 65-67

Cybersecurity Practice #5: IT Asset Management

8min
pages 52-56

Table 7. Expanding DLP to Other Data Channels

3min
pages 49-51

Table 6. Data Channels for Enforcing Data Policies

2min
page 48

Table 3. Example of a Data Classification Schema

1min
page 43

Table 5. Security Methods to Protect Data

6min
pages 45-47

Table 4. Suggested Procedures for Data Disclosure

1min
page 44

Cybersecurity Practice #4: Data Protection and Loss Prevention

1min
page 42

Cybersecurity Practices at Medium-Sized Health Care Organizations

4min
pages 4-6

Table 1. E-mail Protection Controls

19min
pages 15-23

Cybersecurity Practice #3: Identity and Access Management

23min
pages 31-41

Cybersecurity Practice #2: Endpoint Protection Systems

1min
page 24

Table 2. Basic Endpoint Controls to Mitigate Risk at Endpoints

9min
pages 25-30

Cybersecurity Practices at Large Health Care Organizations

3min
pages 7-8

Cybersecurity Practice #1: E-mail Protection Systems

1min
page 14

Introduction

0
page 3
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.